103 - Security
The name's Bond, James Bond.
Read the Docs
If you want to get a better idea about the object that we will be working with in this module, you can review the docs here:
For a more general discussion, take a look here.
Objectives
In this module we'll explain how to create firewall rules in Tuono and how these are instantiated within the public cloud. We'll describe the objects that are created at deployment time and how these are associated with the network objects created in the previous step.
Security Terminology
Network Access Control List (NACL)
A NACL is a logical firewall object that contains the required rules for the 'firewall'. The NACL is attached directly VPC object, and is a function of the VPC not the VM.
Security Groups
AWS security groups act as a firewall at the instance level allowing you to control inbound and outbound traffic.
Key Security Concepts
When Tuono deploys network infrastructure we adhere to a secure by default policy. We automatically deny traffic, allowing you selective control on what should be allowed at the network and firewall layers.
The cloud providers typically follow the opposite approach allowing access to all traffic on all inbound and outbound ports!
Protocol Schema
The protocol schema allows you to set specific ports and traffic types such as allowing SSH and HTTP to pass through the network.
protocol:
web-server:
ports:
- port: 22
proto: tcp
- port: 80
proto: tcp
ping:
ports:
- proto: icmp
Firewall Schema
The Firewall schema uses protocols to adjust firewall rules inbound and outbound that can be used throughout the blueprint.
firewall:
fw-external-access:
rules:
- protocols: web-server
to: self
- protocols: ping
to: self
Last updated
Was this helpful?